Fri.Nov 08, 2019

article thumbnail

Bill Would Create a Federal Digital Privacy Agency

Data Breach Today

Legislation Spells Out Privacy Rights and Enforcement Measures Two Democratic members of the U.S. House have proposed a national privacy law that calls for the formation of a new federal agency to enforce the privacy rights that it defines.

Privacy 113
article thumbnail

Federal and State Authorities Increase Scrutiny and Enforcement of Children’s Privacy; Google, YouTube Agree to Pay a Record $170 Million Fine

Data Matters

This fall, scrutiny has increased on children’s privacy with the FTC and New York Attorney General’s announcement of the largest fine ever for violations of the Children’s Online Privacy Protection Act (“COPPA”), followed by FTC public workshops on updating the COPPA Rule. Combined with increased requirements for the sale of teen personal information under the California Consumer Privacy Act (“CCPA”), and calls for triple fines for children’s privacy violations under a potential CCPA 2.0 refere

Privacy 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analysis: Using Twitter for Espionage

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government. Also featured: A preview of the new NIST Privacy Framework and an update on business email compromise attacks.

Privacy 171
article thumbnail

Italian police shut down darkweb Berlusconi market and arrested admins

Security Affairs

Italian law enforcement shut down the ‘Berlusconi market’ black market and arrested three suspected of being its administrators. Italian financial police “Guardia di Finanza” shut down the ‘Berlusconi market’ black market hosted on the Tor network and arrested three administrators. The site was managed by two individuals that go online with nicknames of “ VladimirPutin ” with the role of administrator and “EmmanuelMacron” as moderator.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Protecting Data in Sprawling Computing Environments

Data Breach Today

Sprawling computing environments - from cloud to containers to serverless - are posing challenges in maintaining visibility and determining if data is secure, says Mike Adler of RSA.

Cloud 162

More Trending

article thumbnail

Following Massive Breach, Capital One Replacing CISO: Report

Data Breach Today

Bank Reportedly Will Look Outside the Company for Security Leadership Nearly four months after Capital One revealed a massive data breach, Michael Johnson, the bank's CISO, is being moved into an outside advisory role, and the company is scouting for a new security leader, according to the Wall Street Journal.

article thumbnail

Covert monitoring in the workplace – impact on an employee’s privacy

Data Protection Report

The Grand Chamber of the European Court of Human Rights (ECHR) has held that Spanish shop workers’ right to privacy under Article 8(1) of the European Convention on Human Rights was not violated when their employer obtained evidence of theft from covert CCTV footage of the employees. The case involved five employees who worked as cashiers at a supermarket chain.

Privacy 79
article thumbnail

Health Data Breach Tally Update: Top Causes

Data Breach Today

An Analysis of the Latest Trends - and What's Ahead Hacker attacks, IT mishaps, and vendor errors are among the top causes of the largest health data breaches added to the official federal tally so far this year. Here's an update.

article thumbnail

#COBOL60: Your COBOL questions, answered – Part Two

Micro Focus

At a recent Micro Focus-sponsored virtual event, more than 300 COBOL community members celebrated its 60th anniversary and by posing over 90 questions to our expert panel. In this, the second of three blogs, COBOL expert Ed Airey answers four more of the 12 most popular question themes: Q5: I am attempting to introduce Agile. View Article.

IT 69
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Update: PCI SSC's Enhanced Contactless Payment Standard

Data Breach Today

In December, PCI SSC plans to publish a new standard for solutions that enable "tap and go" transactions on merchant smartphones and other commercial off-the shelf mobile devices. Troy Leach, the council's CTO, offers insights on the role the standard will play in enhancing security for smaller merchants.

Security 113
article thumbnail

WhatsApp Cofounder Brian Acton on Why Privacy Matters

WIRED Threat Level

The cofounder of the messaging service and the current chair of the Signal Foundation talks about the proliferation of end-to-end encryption in personal communications.

Privacy 69
article thumbnail

Sen. Wyden Pushes FCC on 5G Security

Data Breach Today

Lawmaker Asks for Encryption and Authentication Requirements U.S. Senator Ron Wyden is pushing the Federal Communications Commission to ensure that wireless carriers build new security measures, such as encryption and authentication, into 5G networks as they're rolled out over the next several years.

Security 113
article thumbnail

How to Share Files Securely with Enterprise Clients

OneHub

Over 16,000 companies in the United States are categorized as what many consider “enterprise level” by having 1,000 employees or more. The word enterprise simply means “business”. But we know working with enterprise businesses is much different than start-ups or small businesses. Enterprise businesses are powerful. They typically have a larger budget to work with, can provide a more positive collaboration experience, and even generate a boost to your reputation in your industry.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DOJ: Company Sold Gear With Security Flaws to US Military

Data Breach Today

Prosecutors Allege Firm Sold Chinese Surveillance Tech That Contained Vulnerabilities Federal prosecutors have charged a Long Island company, along with seven of its employees, with selling vulnerability-laden Chinese technology to the U.S. military and other agencies for a decade and passing the gear off as American made.

Military 113
article thumbnail

Microsoft warns of more disruptive BlueKeep attacks and urges patch installation

Security Affairs

Microsoft is warning once again of more BlueKeep attacks that could deliver disruptive payloads and urges organizations to patch their systems. Recently, researchers warned of the first mass-hacking campaign exploiting the BlueKeep exploit , the attack aimed at installing a cryptocurrency miner on the infected systems. The popular expert Kevin Beaumont observed some of its EternalPot RDP honeypots crashing after being attacked. huh, the EternalPot RDP honeypots have all started BSOD'ing

article thumbnail

How AI can supercharge the benefits of business intelligence

Information Management Resources

AI is perfectly aligned to the goal of business intelligence, which is to make business more intelligent by augmenting and, in some cases, automating human intelligence.

article thumbnail

How Do We Bring Equality to Data Ownership and Usage?

WIRED Threat Level

Computational biologist Laura Boykin says scientists are “asleep at the wheel”; activist Malkia Devich-Cyril says citizens also need to pressure technology companies to change.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

xHelper Malware for Android

Schneier on Security

xHelper is not interesting because of its infection mechanism; the user has to side-load an app onto his phone. It's not interesting because of its payload; it seems to do nothing more than show unwanted ads. it's interesting because of its persistence : Furthermore, even if users spot the xHelper service in the Android operating system's Apps section, removing it doesn't work, as the trojan reinstalls itself every time, even after users perform a factory reset of the entire device.

article thumbnail

What Keeps NSA Cybersecurity Boss Anne Neuberger Up at Night

WIRED Threat Level

At WIRED25, the NSA's Anne Neuberger talked election security, low orbit satellites, and weaponized autonomous drones.

article thumbnail

6 Small-Business Password Managers

Dark Reading

The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.

article thumbnail

Data and AI Forum: Highlights from Business Analytics

IBM Big Data Hub

IBM’s Data and AI Forum was chock full of the latest news and trends from all over the Data and AI landscape. Importantly, it was as especially important event for IBM Business Analytics users as we unveiled the latest and greatest from IBM Planning Analytics and IBM Cognos Analytics.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cisco Talos discovered multiple flaws in the LEADTOOLS toolkits

Security Affairs

Cisco Talos security researchers discovered multiple flaws in the LEADTOOLS imaging toolkits that could lead to code execution on the target system. Security experts at Cisco Talos discovered four High severity vulnerabilities in the LEADTOOLS imaging toolkits that could be exploited to execute arbitrary code on the target system. LEADTOOLS is a collection of comprehensive toolkits to integrate document , medical, multimedia, and imaging technologies into desktop, server, tablet, and mobile appl

article thumbnail

4 Ways to Soothe a Stressed-Out Incident Response Team

Dark Reading

IR teams are under tremendous pressure, often working long hours and putting their needs aside amid a security crisis. Their care is just as important as policy and procedure.

article thumbnail

DNA-testing startup Veritas Genetics disclosed a security breach

Security Affairs

DNA-testing startup Veritas Genetics disclosed a security breach that exposed customer information, but genetic information, health records are not affected. Veritas Genetics is a whole genome sequencing company that provides actionable insights for a healthier life and family, it offers whole-genome sequencing for $599. The company announced that it recently discovered authorized access to its customer-facing portal, the good news is that the portal didn’t contain genetic data, DNA-test results

article thumbnail

Cloudflare CEO Matthew Prince on the Struggles of Policing the Web

WIRED Threat Level

At WIRED25 the internet infrastructure chief talks about doing the hard calculus of pulling support from controversial sites—and why that’ll happen again.

Privacy 44
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Capesand is a new Exploit Kit that appeared in the threat landscape

Security Affairs

A recently discovered exploit kit dubbed Capesand is being involved in live attacks despite the fact that it’s still under development. In October 2019, researchers at TrendMicro discovered a new exploit kit dubbed Capesand that is being involved in live attacks. The tool was discovered while analyzing a malvertising campaign employing the RIG EK to deliver DarkRAT and njRAT. .

article thumbnail

Covert monitoring in the workplace – impact on an employee’s privacy

Data Protection Report

The Grand Chamber of the European Court of Human Rights (ECHR) has held that Spanish shop workers’ right to privacy under Article 8(1) of the European Convention on Human Rights was not violated when their employer obtained evidence of theft from covert CCTV footage of the employees. The case involved five employees who worked as cashiers at a supermarket chain.

Privacy 40
article thumbnail

Pwn2Own Tokyo 2019 -Day2: experts hacked Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers

Security Affairs

Pwn2Own Tokyo 2019 -Day2: Experts earned a total of $120,000 for finding exploits against Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers. On the second day of the Pwn2Own Tokyo 2019 hacking contest, white hat hackers received a total of $120,000 for finding exploits against Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers.